Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2024 04:43

General

  • Target

    1608535759c816c982543c81a50e953a_JaffaCakes118.html

  • Size

    22KB

  • MD5

    1608535759c816c982543c81a50e953a

  • SHA1

    a5b429bdc0af7a24fd27223436622180957b6744

  • SHA256

    a8386e15afb87183aaa8a83bebcf5fa293deb88dc56b5082d11d912df67996e2

  • SHA512

    b7d6afa19baf64a24f8e560617f973ffda5c3b2c1be2bb043d209ff692defa4bde8b097ca1a05c0b783e683c0d432ed7349748b7cfc5c8c2234816e9e3d2706b

  • SSDEEP

    384:SIe5Qk3IPmdCFR7fHfbqatNxFn72lH49jD3rGeEbqszfb5nqIBSIiI9RdyisoBJn:SFTufTqaZglH49jD3eDfZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1608535759c816c982543c81a50e953a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8393367def785a2642cf54962deb2cee

    SHA1

    70298ab4afdaa35cb435f36cb4438efb69659acb

    SHA256

    b2e01945e5729721204deaca146dbf0dedb1b80878ccbe1726896f432374c64c

    SHA512

    a663823a161ec8aba12e695141fd371e3e1feedb85b9eeabbbbd761ec101b20de72500565f0343f65c99824a2333cd65c86ae2ab5ec792ee21ae7a49d0ac869a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    674af20617b7ae027382d1dc07947c5b

    SHA1

    09c6802d0cebdc76abfcd73631bcccad06a55d6a

    SHA256

    2e3a1b6b46b1b5a76e927f4b07a6b7f36d8fe924ec21239463cb1e1d65683e67

    SHA512

    c516554ab26effb29050b035a820304ecca24d6fe0df76a4a3e096a7f041b443e653aca065b28c0b614306636851b33cd9ef17e2d4f6607a2ecc1bb2ab76cf84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ffb8a61112bb472f1cfaca433bbf19a7

    SHA1

    40ed3a42041574939c921e90f32a1e71d91dd4ef

    SHA256

    0f09b42b1c2c930b114e5771bf356005ea2fb6e1ecbc9466c671e622d6def084

    SHA512

    15d45ccef44df20c64abdb216334a81307b56d2273a5f16bbfb7ccadcd16e408067cea1908790bea19f4805b26c9f8a60fb9e19833108c872612fc9d8294c188

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0dc116c5d91d2d1f15146600ee14cd2a

    SHA1

    4e5b1dd2531ef4a589aa4aef41d1399309f97cfe

    SHA256

    b4d08db822505c17da2c9b843c161d2e76db07ca487493d181417eebe571cb42

    SHA512

    b30d66fb983ac3a150a7570152c4d586dc64d61e954b17e0151fe04efb2ff3b869660780cc6592592c9b5fbc86867768832edd44046abcfbe90fcf2426267e83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    281fe471e751636a20feba98158f760b

    SHA1

    80fcbb0bd00d1becd866f33e471a32160ddd78be

    SHA256

    f2fb8752de07018f45bc7a385093cea312e760c0e454e2ccc46a912218b63708

    SHA512

    5f02f5bcfbda63de062db5a1de091875f44e98099a98876497c4807d4a3adc40a1e6ac04d342e71401ed5a8e25abc07174a5e7555703fd64f50adf4e78fb5936

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1a96a18822be00314fae32ae56d9314a

    SHA1

    7dd1f851b2fb6c8c0a675b1af391cd537dcaea7f

    SHA256

    91415d53fbf10240f5e75ad8f1e09d663c501f8de2a779b65428e0ce41696b96

    SHA512

    7209aa606583ec0a73a91f6148c63fea4c34f4871b8f61418293f3d0726670c0096dccf70e19273952ba8a6d512d25062fb0ff3bcdb591495c45dd51ee5e1bec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a56a637c4d6b47b387af68bb2d373270

    SHA1

    a713ac5a708503380c7f708a9992250dd62a6b76

    SHA256

    4977cf7d25f89fc41477ab0f4e234f3aa1c3f7c400f85479b3ce42c06930aa3c

    SHA512

    9df8c5d0ccd44ca64fbab59dc9db9b197abe56f2c7275bd218bd55d6d81b8fa8a63e520b0d0a81b036c7191977098eb32c3ffb14dfbafb8446241cbd9f69c0ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ee7c9e220e4dbd876cfb84576200170

    SHA1

    ac5c0295adf0f88e80fec50ed98f2a9f4b8ed8c7

    SHA256

    e6a49c7f4b2d21db501b1bd25d9892199cd5b1c406bfbf71abf16f32a0819c01

    SHA512

    632b37d96aa1483b201583ff90221c61a57c2d400fa0f9a6a5cac52a5f261134c8b588565805daa47775fac055ad08d535461bca81e3b0af82d4ce923bed38ff

  • C:\Users\Admin\AppData\Local\Temp\Cab2271.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar22E5.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a